You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/concepts-limitations.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.author: allensu
16
16
17
17
---
18
18
# Load Balancer components and limitations
19
-
Azure Load Balancer contains several key components for it's operation. These components can be configured in your subscription via the Azure portal, Azure CLI, or Azure PowerShell.
19
+
Azure Load Balancer contains several key components for its operation. These components can be configured in your subscription via the Azure portal, Azure CLI, or Azure PowerShell.
20
20
21
21
## Load Balancer components
22
22
@@ -86,9 +86,9 @@ The following image displays the hash-based distribution:
86
86
* Easy upgrade and disaster recovery of services, because the front end can be dynamically mapped to another instance of the service.
87
87
* Easier access control list (ACL) management. ACLs expressed as front-end IPs don't change as services scale up or down or get redeployed. Translating outbound connections to a smaller number of IP addresses than machines reduces the burden of implementing safe recipient lists.
88
88
89
-
Standard Load Balancer utilizes a [robust, scalable, and predictable SNAT algorithm](load-balancer-outbound-connections.md#snat).These are the key tenets to remember when working with Standard Load Balancer:
89
+
Standard Load Balancer utilizes a [robust, scalable, and predictable SNAT algorithm](load-balancer-outbound-connections.md#snat).These are the key tenets to remember when working with Standard Load Balancer:
90
90
91
-
- load-balancing rules infer how SNAT is programmed. Load balancing rules are protocolspecific. SNAT is protocolspecific and configuration should reflect this rather than create a side effect.
91
+
- load-balancing rules infer how SNAT is programmed. Load balancing rules are protocol-specific. SNAT is protocol-specific and configuration should reflect this rather than create a side effect.
92
92
93
93
-**Multiple frontends**
94
94
When multiple frontends are available, all frontends are used and each frontend multiplies the number of available SNAT ports. If you want more SNAT ports because you are expecting or are already experiencing a high demand for outbound connections, you can also add incremental SNAT port inventory by configuring additional frontends, rules, and backend pools to the same virtual machine resources.
@@ -97,13 +97,13 @@ The following image displays the hash-based distribution:
97
97
You can choose and control if you do not wish for a particular frontend to be used for outbound connections. If you want to constrain outbound connections to only originate from a specific frontend IP address, you can optionally disable outbound SNAT on the rule that expresses the outbound mapping.
98
98
99
99
-**Control outbound connectivity**
100
-
outbound scenarios are explicit and outbound connectivity does not exist until it has been specified. Standard Load Balancer exists within the context of the virtual network. A virtual network is an isolated, private network. Unless an association with a public IP address exists, public connectivity is not allowed. You can reach [VNet Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) because they are inside of and local to your virtual network. If you want to establish outbound connectivity to a destination outside of your virtual network, you have two options:
100
+
outbound scenarios are explicit and outbound connectivity does not exist until it has been specified. Standard Load Balancer exists within the context of the virtual network. A virtual network is an isolated, private network. Unless an association with a public IP address exists, public connectivity is not allowed. You can reach [Virtual Network Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) because they are inside of and local to your virtual network. If you want to establish outbound connectivity to a destination outside of your virtual network, you have two options:
101
101
- assign a Standard SKU public IP address as an Instance-Level Public IP address to the virtual machine resource or
102
102
- place the virtual machine resource in the backend pool of a public Standard Load Balancer.
103
103
104
104
Both will allow outbound connectivity from the virtual network to outside of the virtual network.
105
105
106
-
If you _only_ have an internal Standard Load Balancer associated with the backend pool in which your virtual machine resource is located, your virtual machine can only reach virtual network resources and [VNet Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md). You can follow the steps described in the preceding paragraph to create outbound connectivity.
106
+
If you _only_ have an internal Standard Load Balancer associated with the backend pool in which your virtual machine resource is located, your virtual machine can only reach virtual network resources and [Virtual Network Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md). You can follow the steps described in the preceding paragraph to create outbound connectivity.
107
107
108
108
Outbound connectivity of a virtual machine resource not associated with Standard SKUs remains as before.
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ An **[internal (or private) load balancer](./concepts-limitations.md#internalloa
36
36
For more information on the individual load balancer components, see [Azure Load Balancer components and limitations](./concepts-limitations.md)
37
37
38
38
>[!NOTE]
39
-
> Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you need high-performance, low-latency, Layer-4 load balancing, see [What is Azure Application Gateway?](../application-gateway/overview.md) If you're looking for global DNS load balancing, see [What is Traffic Manager?](../traffic-manager/traffic-manager-overview.md) Your end-to-end scenarios may benefit from combining these solutions.
39
+
> Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you need high-performance, low-latency, Layer-7 load balancing, see [What is Azure Application Gateway?](../application-gateway/overview.md) If you're looking for global DNS load balancing, see [What is Traffic Manager?](../traffic-manager/traffic-manager-overview.md) Your end-to-end scenarios may benefit from combining these solutions.
40
40
>
41
41
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](https://docs.microsoft.com/azure/architecture/guide/technology-choices/load-balancing-overview).
0 commit comments